# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8e224394e41454b59fc1641240d5e74eb428739f75058b70a11d29047ed0127e
Pseudo Output
74830781b3fe69c88c2cdd1c07a7c761f87cc33004578ccda37b2a0a5bc4741d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a6a84df7c84838920dca0ddf360281fa44f1238cfd3d128178e97ed9a25933f
Commitment
a8dd5a40841997a9f76b1db1408ef328f2486004fef0ecc393d39d306f070f28
Range Proof
672 bytes (Bulletproof)
Memo
96ab102a42382b818d0a19820a5816cd5f886217303304a0be76c7c823f61e36b249fddfeadbfde194ef65c1e314f7d3ad9d4b4e9aa854cfca266367bdd1c53b134eec1ba94d06051601bafb64ceb230739189f28c14699154ae2187ded8a0961e94e09aa8168a5333a65cfbe4719707116222e22d49f5dce5f758d6c72fc548 (encrypted)
Stealth Address
1021ceb645ada0f6e0d3ca7e715abe1fe0a321ffde3e296fb0802351d7a6587f
Commitment
0a61fba75cf7e3995a2583e3b5bb46b3a1d2ba151c4dfeb523621e1f5b4f3e67
Range Proof
672 bytes (Bulletproof)
Memo
7e82bd331776a67e1bbf3f11410fd9d33452c65cf436cc83419859e7e3a421326eb7dc6d17832cc9ca504e5739aff275037ba4d2768ee3370cb46eacf28d995545512a64493e94f9c7d83f69c5cd0b2674a9b228a600f9147e182f4c611a44cf61c1f8316a03e6ccc0990682fc424c12e53e24cc4623373569b2e690cba45b43 (encrypted)
Stealth Address
d47b68b32df89f2b3324c0f71a42b813a5f86bcc239676e826627fa52c97b85b
Commitment
187251a702c0493a402dcbab50f5742c271020044c34f124d25ef0340888e30b
Range Proof
672 bytes (Bulletproof)
Memo
1990e8697ebc9ed28aa86267ab12c87b0d0b07e2f1894e315dc630a813f0166378a445720a9b690d4371501b6c3217bd49b567fcfa81bf60c2f0a59c046b87c0ee1a2d4471bfeee46276b4639b48eee5279fff3d7063f8e9607d677f17881df64133f498c07df162ebc2c27409a920ca28b56173928cb93e98528735de47154b (encrypted)